First published: Wed May 11 2022(Updated: )
A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated network-based PAN-OS administrator to upload a specifically created configuration that disrupts system processes and potentially execute arbitrary code with root privileges when the configuration is committed on both hardware and virtual firewalls. This issue does not impact Panorama appliances or Prisma Access customers. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.23; PAN-OS 9.0 versions earlier than PAN-OS 9.0.16; PAN-OS 9.1 versions earlier than PAN-OS 9.1.13; PAN-OS 10.0 versions earlier than PAN-OS 10.0.10; PAN-OS 10.1 versions earlier than PAN-OS 10.1.5.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.23 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.16 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.13 | |
Paloaltonetworks Pan-os | >=10.0.0<10.0.10 | |
Paloaltonetworks Pan-os | >=10.1.0<10.1.5 |
This issue is fixed in PAN-OS 8.1.23, PAN-OS 9.0.16, PAN-OS 9.1.13, PAN-OS 10.0.10, PAN-OS 10.1.5, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0024 is a vulnerability in Palo Alto Networks PAN-OS software that allows an authenticated network-based administrator to upload a specially crafted configuration and potentially execute arbitrary code with root privileges.
CVE-2022-0024 affects Palo Alto Networks PAN-OS software versions 8.1.0 to 8.1.23, 9.0.0 to 9.0.16, 9.1.0 to 9.1.13, 10.0.0 to 10.0.10, and 10.1.0 to 10.1.5.
CVE-2022-0024 has a severity rating of 7.2 (critical).
An attacker with authenticated network access can exploit CVE-2022-0024 by uploading a specially created configuration to disrupt system processes and potentially execute arbitrary code with root privileges.
Yes, Palo Alto Networks has released patches to address the vulnerability. It is recommended to update to the latest version of PAN-OS software.